Informação de Fornecedores

Juniper Unified Access Control

Juniper Networks Unified Access Control is a comprehensive access control solution that:

• Combines user identity, device security state, and location information for dynamic, session-specific access policy by user• Uses the network you’ve already deployed—including your existing AAA infrastructure; any 802.1X-enabled switches or access points, including the Juniper Networks EX Series Ethernet Switches; and/or any Juniper Networks firewalls, including the Juniper Networks SRX Series Services Gateways• Is based on field-tested components being used today in tens of thousands of network deployments worldwide.

Juniper NetworksJuniper's Unified Access Control NAC product builds on Juniper's strength in the SSL VPN andin-line network IPS markets and on its acquisition of Funk Software's RADIUS and 802.1Xproducts. Juniper UAC provides a wide array of enforcement options, lacking only DHCPenforcement. When deployed in conjunction with UAC, Juniper's firewalls and EX LAN switchesbecome identity-aware and are able to enforce policies based on the user's role.

Juniper UAC Strengths• Unified Access Control is a strong solution for implementing device policies and/or userpolicies, which enables Juniper to compete effectively for opportunities in all four NACusage cases outlined in the Market Overview section.• Juniper has some of the largest NAC deployments (that is, number of endpoints) in themarket.• Juniper has been a driver for open NAC standards and was an early partner withMicrosoft and its MNAP efforts. Juniper is well-positioned to grow its NAC business asmore PCs become MNAP-ready.

This approach to adaptive access control reduces the cost and complexity of delivering and deploying granular network access control from the branch to the corporate data center. It also addresses pain points like insider threats, guest user access, outsourcing and off-shoring, and regulatory compliance.

UAC is composed of:

The IC Series Unified Access Control Appliances, hardened, centralized policy management servers The UAC Agent, a dynamically downloaded agent that collects user credentials and assesses device security state (UAC also offers an agent-less mode for use when software downloads are not practical, such as with guest users.) UAC enforcement points, such as any vendor-agnostic 802.1X-enabled wireless access point or switch (including Juniper Networks EX Series Ethernet Switches) and any Juniper Networks firewall platform (including the SSG Series and ISG Series with IDP platforms), as well as the SRX Series Services Gateways.